Proceedings of the Workshop on Fog Computing and the IoT 2019
DOI: 10.1145/3313150.3313222
|View full text |Cite
|
Sign up to set email alerts
|

The need for deterministic virtualization in the industrial internet of things

Abstract: Real-Time virtualization is commonly accepted to act as one of the key enablers of Fog Computing and the Industrial Internet of Things (IIoT). We motivate requirements which any hypervisor qualifying as a deterministic virtualization solution for IIoT should fulfill. We characterize existing work in the field of real-time virtualization to illustrate the trade-off between flexibility and deterministic execution. Furthermore, we indicate a lack of hypervisors that meet all of our requirements on deterministic v… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Hypervisors that fulfil all of the criteria for deterministic virtualization have been defined as a requirement [23].…”
Section: Related Workmentioning
confidence: 99%
“…Hypervisors that fulfil all of the criteria for deterministic virtualization have been defined as a requirement [23].…”
Section: Related Workmentioning
confidence: 99%
“…An example of a COTS multicore processor is the Intel Atom processor, which implements hardware virtualization extensions, such as Intel's VT-x and VT-d, second level address translation (SLAT), and single-root I/O virtualization (SR-IOV) [58]. The software component has a software stack that consists of a hypervisor, middleware, partitions with dedicated operating systems, and an application layer, as in Figure 7c.…”
Section: Fogified Drive Architecturementioning
confidence: 99%
“…Samaniego, Espana, and Deters have presented an architecture that mixes dew computing to delivery of virtual resources at the edge level. Furthermore, a permission‐based blockchain protocol has combined to achieve security and reliability on edge networks.…”
Section: Review Of Selected Papersmentioning
confidence: 99%